ICONIUM NETWORKS | Security Awareness Training

Iconium Networks has partnered with a leading cyber-security firm to offer clients high-level security awareness training, using an easily digestible series of videos, games, and exercises.

Security Awareness Training

45-minutes
This is a high quality, 45-minute web-based interactive training using common traps, live demonstration videos, short tests and the new scenario-based Danger Zone exercise. Security Awareness Training specializes in making sure employees understand the mechanisms of spam, phishing, spear phishing, malware, ransomware and social engineering, and are able to apply this knowledge in their day-to-day job. The training is split in 4 modules that an employee can do over time. This module is available in English, Spanish, German, and British.

25-minutes
This 25-minute module is a shorter version of the full 45-minute training session. It covers the mechanisms of spam, phishing, spear phishing, spooﬁng, malware hidden in ﬁles, with an interactive test at the end, as well as a fresh videos.

15-minutes
This 15-minute module is an advanced, condensed version of the full 45-minute training, often assigned to management. It covers the mechanisms of spam, phishing, spear phishing, spooﬁng, malware hidden in ﬁles, and Advanced Persistent Threats with an interactive “Red Flags” phishing test at the end, including email best practices. This module is now available in 26 languages.

Security Training Modules

Basic Security Awareness Training Course
Our new Basic Security Awareness Training is 30 minutes long. It has the “Your Role” section from our 45 min. course. It also contains the shortened Red Flags section and a new “Common Threats” section that covers the fake Excel/CEO fraud threat as well as ransomware, and has a 10-question assessment at the end.

Ransomware
This course takes an employee through the basics of what ransomware is, how it came to be, and what the risks of ransomware are. It has a lot of the information of the immensely popular Ransomware Hostage Rescue Manual. It’s 25 minutes long and has a 10-question assessment at the end that needs to be passed with an 80% score.

Ransomware For Hospitals
Hospitals are currently targeted by cyber criminals, penetrating their networks and locking patient ﬁles with crypto-ransomware so that no data is accessible for any hospital worker. This short (7-minute) module gives anyone working in a hospital the basics of ransomware, email security and Red Flags they need to watch out for to help prevent very expensive attacks like this.

Strong Passwords
This 15-minute module covers the rules of how to create and use strong passwords in both an oﬃce environment and at the house. Employees learn the 10 important rules for safer passwords, minimum password length, how to remember long passwords, get trained in best practices like using pass phrases and how to use a diﬀerent password for every website.

Mobile Device Security
This 15-minute module specializes in making sure your employees understand the importance of Mobile Device Security. They will learn the risks of their exposure to mobile security threats so they are able to apply this knowledge in their day-to-day job.

CEO Fraud
In this 10-minute module, employees are quickly brought up to speed to inoculate them against what the FBI calls “Business Email Compromise” and what is commonly known as CEO Fraud. Concepts like social engineering, email spooﬁng, and the two ways that CEO Fraud is being perpetrated are covered. There is a short video with a live demo of an infected Excel ﬁle, and a short quiz to test understanding at the end. Downloadable PDF Resources: Social Engineering Red Flags, and Security Awareness: Best Practices.

Basics of Credit Card Security
This 20-minute module covers the basics of credit card security. It is meant for all employees in any organization who handle credit cards in any form, whether taking orders on the phone, swipe cards on terminals or through devices connected to smart phones. It teaches employees to handle credit card information securely to prevent data breaches. Diﬀerent types of cards are covered, which speciﬁc elements the hackers are after, and explains how malware like keyloggers, password crackers, and spyware can endanger credit card information. Employees are taught the rules for paper copies of credit card data, and things to remember during data entry, including things NOT to do like sending credit card information through email and text and more. A quiz ends oﬀ this module.

PCI Compliance Simpliﬁed
This 30-minute module uses real examples of credit card fraud, and how to protect your organization against this by being PCI compliant. This course is for anyone that’s responsible for handling credit cards in your organization and qualiﬁes as Security Awareness Training. Especially owners, the CFO or Controller, managers and IT people in charge of credit card processing should take this course. After the training, you are able to download essential references regarding being or becoming PCI compliant.

Safe Web Browsing
This 10-minute module takes employees through the basics of safe web browsing. They will learn how to avoid common dangers and the “do’s and “don’ts” of safe web browsing. This module is set up to be fully interactive and could be presented as a quiz to take and “see how much you know”.

GLBA Compliance Course
(for Financial Institutions only)
In this module, employees of ﬁnancial institutions are stepped through the concepts of “Non-Public Personal Information”, or NPPI, best practices for protecting customers’ personal information, the employee’s role in ensuring protection of NPPI, what is social engineering and how not to get tricked, how to protect against unauthorized access and misuse of protected information, and how to provide notice of an incident that may compromise customer information security.

Micro-Training

Credit Card Security (Part 1)
This 5-minute micro-module covers why it’s so important to protect credit card information; what hackers are after, how employees are a key factor in keeping credit card information secure; and how malware can be used to capture this information.

Credit Card Security (Part 2)
This 5-minute micro-module covers the rules for safely storing credit card information, the danger in texting credit card numbers, the rules for staying secure while working remotely, and the dangers of using Wi-Fi.

Danger Zone Exercise Micro-module
This 5-minute micro-module is an interactive course all about phishing. There are four scenarios where the learner is asked to spot the potential threat. Each scenario provides valuable feedback based on the learner’s responses. There are two versions of this course, one with sound and one without.

Email Spooﬁng
This 5-minute micro-module covers the very important topic of email spooﬁng. It deﬁnes social engineering and shows how hackers can inﬁltrate an organization and create spoofed emails that trick unsuspecting employees. It also covers a real-life example of just how dangerous email spooﬁng can be.

Ransomware
This powerful 5-minute micro-module takes an employee through the basics of ransomware, the diﬀerent methods used to infect a machine, and how hackers trick unsuspecting users into downloading infected ﬁles.

Safe Web Browsing
This 5-minute micro-module takes employees through the basics of safe web browsing. Participants will learn how to avoid common dangers and discover the “dos and don’ts” of safe web browsing. This module is fully interactive with a quiz at the end.

Social Engineering
This 5-minute micro-module deﬁnes social engineering and describes what criminals are after. It covers the three main areas of attack: digital attacks, in-person attacks, and phone attacks.

Social Media Best Practices
This 5-minute micro-module provides a brief overview of best practices that businesses and employees can implement to prevent attacks and protect sensitive information from social media hackers.

Strong Passwords
This 5-minute micro-module covers the rules of how to create and use strong passwords in both an oﬃce environment and at home. Employees learn the 10 important rules for safer passwords, minimum password length, and how to remember long passwords.

USB Attack
This 5-minute micro-module covers the risks of picking up a USB stick and plugging it into a workstation.